Hacker Newsnew | past | comments | ask | show | jobs | submit | fisadev's commentslogin

> This is the "broken windows" effect in real life.

Had to point this out: windows are real, the broken windows effect is something from "real life".


Yea it was poorly phrased, but so many people brush off the platitudes like "broken windows" in our industry.


If you read the comments on the article you will understand those tweets.

> "I don't understand why I am to give her my money."

Maybe because you are a good human being who wants to help another human being in need?

> "Why particularly her, what about the rest of customer reps at Yelp"

She's asking for help because she needs it, as much as the rest. She isn't telling you that you shouldn't help the others. She is even proposing things that would benefit all of them.

If you can help them all, great! If you can help just one, help one, either she, or any of the others. Nobody here is telling you "you should help her instead". Not even her.

And "if I help one I'm not helping the others" is no excuse to not to help anyone. Not being able to help them all is no excuse to not to help at least somebody.


"her", not "she"


Harry Potter and the Methods of Rationality. Don't know if "great", but quite interesting and fun free book at hpmor.com


The input is sanitized: https://github.com/prometheus-ar/vot.ar/blob/master/msa/voto...

It's just that people are too eager to scream "vulnerability!" without properly checking it before.


Correct me if I am wrong but client side sanitization does not really count. It is really easy to bypass that check (send packets directly to the backend or use dev tools for example)


No, because it's not a website with a network between the backend and frontend. It's a desktop app, with no network connection, just using html for the gui. Nobody can send packages to it.


Ex-developer of that system here (not working in MSA anymore since 3 years ago). Can answer questions if there aren't hundreds of them.


Hi, have a couple...

1) First, I found the complete lack of security puzzling. I mean, they don't even use SSL in their site logins. You use md5 to check firmware...and the coders are obviously capable of using proper cryptography, but they won't. It's like they completely gave up on any kind of security whatsoever. Is this something deliberate?

2) Why the RFID to store the vote? why not a qr-code? it's hard to read? RFID tags are hundreds of times more expensive, they can be unlocked, re-written, must be protected with a weird faraday cage that do not work correctly (Faraday cages must be grounded!) they are a nightmare. I'm sure there must be a good reason.


1) Here you make a lot of false statements, and then conclude on the lack of security based on them. So let me answer to each of them:

> they don't even use SSL in their site logins.

Which sites? The only one I can think of having a login is the transmission site, and it not only uses SSL, it even has two way certs validation, so even the client has to have valid SSL certs which the server validates.

> You use md5 to check firmware

No. They use SHA256, not MD5, and to check the CD software, not firmware (there is no way you can checksum a firmware securely if the firmware wants to lie to you).

> and the coders are obviously capable of using proper cryptography, but they won't

Yes, they use encryption, where it makes sense, like the double SSL in transmission.

But I guess you are referring to the unencrypted chip data. It would be useless to encrypt that. Think for a second: the machine needs to be able to read that chip on the counting step. So you are distributing the unencryption keys in hundreeds of public CDs that very same day. Having the data on the chips encrypted would accomplish nothing, they keys to unencrypt them would be public. It's like puting a padlock in your bike, but leaving the key along the padlock.

So no, nobody has given up on security, you just probably have read misleading things.

2) Again, several wrong things, will answer separatedly:

> why not a qr-code? it's hard to read?

This is the only one I can't answer with full knowledge, but I think it had something to do with them being hard to read because of the quality of the print (thermical fast printing)

> they can be unlocked, re-written

No, they can't. It's a physical process that burns and cuts connections on the chip, you can't "rebuild" them to unlock it again.

The thing you probably saw was people rewriting demo ballots, which are created with the machine configured in demo mode, in which it doesn't burn the chips, to be able to reuse the same in several demos. The people claiming that even published photos of the supposed "real" ballots they where rewritting, and the ballots had in really big letters crossing all the print, the text "DEMOSTRACION USO NO OFICIAL". So, no, they weren't rewriting real ballots, it's obvious those where demo ones.

> with a weird faraday cage that do not work correctly

Reallity doesn't agree with you, hehe. Even people opposing the system had tried and weren't able to read the chips through the shield. It's simply a shield which has enough mass to absorb the signal that the chip emits.


>Which sites?

The tech login sites.

>They use SHA256, not MD5

https://github.com/prometheus-ar/vot.ar/blob/master/msa/voto...

>double SSL

Come on...

>hard to read because of the quality of the print

print them bigger? change the printer? this makes no sense, unless you want to have the ability to change the vote. It's the only logical explanation.

>I guess you are referring to the unencrypted chip data.

No, I'm referring, for example, to software package signatures.

>No, they can't. It's a physical process

This is simply not true. Even if you had the power to physically burn something in the chip (you do not), many RFID chips allow unblocking with a special password, because they do not really burn anything. You don't know how the rfid chip works internally because the design is not public, and there are no ways to check the model of chip used.

> Even people opposing the system had tried

Who? were they qualified RF engineers or just some dudes with a commercial RFID reader? No signal can be "absorbed" completely.


s/where/were/g :)


> Its killer feature is that the same code can run on the client and the server.

In most cases that's not even completely true. Try to run in the browser anything with a node require... That's why we have to use ugly hacks like browserify :/ (not meant to bash browserify, it's really useful. The ugly thing is having to bundle 10s of thousands of javascript lines of multiple packages in a single file)


Let me guess: you are also addicted to Matt Easton videos :)


Not only Matt Easton. Skallagrim, Lindybeige, Tim is Green, Metatron, and others.


Also know Lindybeige and Skall, but Tim and Metatron are new to me. I'll watch them later, thanks for the data!


Metatron has the historical knowledge, but isn't a HEMA practitioner yet. Tim has some great videos, but hasn't been so prolific of late.


If you want to read the full book, or any other original sources on European martial arts, there is a well known wiki where to find them all:

http://wiktenauer.com/


Awesome site!


Not sure about him, but pretty sure he already did more for humanity than Obama when he received the award. (disclaimer: south american here)


An update from Kiva: their field partners, who may not have english as a first language, use templates and fill in the blanks. So nothing to be alarmed from.

The full response:

"Hi Juan,

Thanks so much for your email and writing in about these two loan profiles.

I took a look, and while the stores do look similar, and the language is also similar, these are two distinct borrowers.

As you may know, the loan descriptions you see on Kiva's website are written by our Field Partners. To help the staff at our partners, who may not have English as a first language, our team will sometimes provide loan description templates. These templates help make it easier for our Field Partners to draft loan descriptions by allowing them to fill in different facts about the borrower, such as number of children, marital status, etc. Because some of our partners have these templates, you may see similarities in the style of different loan descriptions from the same Field Partner. This may be why you see loans with similar verbiage when browsing the Lend page of our website.

While these similarities shouldn't be a cause of alarm, you may be interested to know that Kiva does use a process called borrower verification to to verify the accuracy of the information included in the borrower profiles posted on the Kiva website.

Hope this provides some helpful context, and if you have any other questions, let me know!"


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: